1. Explain the ethical issues surrounding information technology.
Information ethics concern the thical and moral isssues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution and provessing of information itself - with or without computer technologies. Individuals determine how to use information and hwo information affects them. How individuals behave towards each other, and how they handle information and technology, are largely influenced by their ethics. Ethical dilemmas usually arise not in simple situations but out of a clash between competing goals, responsibilities and loyalties. The decision making process has more than one socially acceptable 'correct' decision.
2. Describe a situation involving technology that is ethical but illegal.
An example of a situation involving technology that is ethical but illegal is when an American, Joe Reidenberg, recieved an offer for a mobile phone service from AT&A Wireless. The offer revelaed that AT&A Wireless has used Equifax, a credit reporting agency, to identify Joe Reidenberg as a potential customer. This strategy seemed like good business as Equifax could generate additional revenue by selling infomration it already owned and AT&A Wireless could identify target markets and increase response rates. However, the Fair Credit Reporting Act (FCRA) in the US forbids repurposing credit information except when the information is used for 'a firm offer of credit or insurance'. In other words, the only product that can be sold based on credit information is credit.
3. Describe and explain one of the computer use policies that a complany might employee.
An Ethical Computer Use Policy contains general principles to guide computer use behaviour. For example, the ethical computer use policy may state that users should refrain from playing computer games during work hours. This policy ensures the users know how to behave at work and the organisation has a published standard by which to deal with their users. For example, after appropriate warning, a company might terminate an employee who spends significant amounts of time playing computer games at work.
4. What are the 5 main technology security risks?
- Human Error
- Natural Disasters
- Technical Failures
- Deliberate Acts
- Management failure
5 Main Technology Security Risks |
5. Outline one way to reduce each risk.
Human Error - Humans need to concentrate on what they are doing when using information technology. Individuals must concentrate on the information they are entering in order for human errors to be minimised.
Natural Disasters - Duplicate copies of information can be made as well as the information being copied onto a back up system to ensure that no information is lost if a natural disaster is to occur.
Technical Failures - Information should be copied regularly onto a hard drive or other type of back up system so that if a technical failure occurs no information is lost
Deliberate Acts - Strong security systems should be active at all time to ensure that information is kept safe and that only authorised users can access the information
Management Failure - Management should be a number fo policies and procedures in place to ensure that individuals know how to operate, in order to minimise security risks
6. What is a disater recovery plan, what strategies might a firm employ?
Every business should have an active disaster recovery plan, that is a written plan for the resumption of business after a disaster. A disaster recovery plan should involve:
- A Communications plan
- Alternative sites
- Business Continuity
- Location of Backup data
- Off site data kept in date order
- Well documented procedures
- Regular Recovery Testing
No comments:
Post a Comment